Abstract
Development in digital infrastructure have resulted in distributed denial of service attacks to become increasingly widespread and target large number of host machines in organizations, that crashes down access when requested by the user. Such attacks when deployed on a larger scale, can result in a wastage of time and resources. With increasing complexity, these attacks have become more sophisticated and complex, leading to the emergence that has led to the rise of several algorithms and tools, that uses SDN (Software-Defined Networking) networks, in the domain of network security. Through this paper, we have surveyed what is a DDoS attack, its different forms and the use of software-defined networking tools such as Mininet and HPE VAN SDN controller, to analyze some basic topologies. Four different topologies were created namely Single, Linear, Tree and Torus, and experiments were performed to analyze the flow of traffic in these topology networks. From these experiments performed, the ping statistics in terms of minimum, maximum, average and minimum deviation Round-Trip Time (RTT) in milliseconds were computed for each of the given topologies. The values obtained as ping statistics were tabulated and represented graphically. A visual analysis between number of nodes and average round-trip time for the three topologies were done graphically. We have compared and analyzed several open-source tools, on their basis of efficiency of detecting the attack. Apart from this, a study of several instances of DDoS attacks in organizations regarding the mitigations and step initiated to withstand the intensity of these attacks, has also been done.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ottis, R.: Analysis of the 2007 cyber attacks against Estonia from the information warfare perspective. In: Proceedings of the 7th European Conference on Information Warfare, p. 163 (2008)
Hoque, N., Bhattacharyya, D., Kalita, J.: Botnet in DDoS attacks: trends and challenges. IEEE Commun. Surv. Tutor. 99, 1 (2015)
Bawany, N.Z., Shamsi, J.A., Salah, K.: DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab. J. Sci. Eng. 42(2), 425–441 (2017). https://doi.org/10.1007/s13369-017-2414-5
Jain, S., et al.: B4: experience with a globally-deployed software defined WA. ACM SIGCOMM Comput. Commun. Rev. 43(4), 3–14 (2013)
Douligeris, C., Mitrokotsa, A.: DDoS attacks and defense mechanisms: classification and state-of-the-art. Comput. Netw. 44(5), 643–666 (2004)
Criscuolo, P.J.: Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory (CIAC), UCRL-ID-136939, Rev. 1, Lawrence Livermore National Laboratory, 14 February 2000. http://ftp.se.kde.org/pub/security/csir/ciac/ciacdocs/ciac2319.txt
Dittrich, D.: The DoS Projects ‘‘trinoo’’ Distributed Denial of Service attack tool, University of Washington, 21 October 1999. http://staff.washington.edu/dittrich/misc/trinoo.analysis.txt
Dittrich, D.: The Tribe Flood Network Distributed Denial of Service Attack Tool. University of Washington, 21 October 1999
Barlow, J., Thrower, W.: TFN2K––an analysis (2000). http://security.royans.net/info/posts/bugtraq_DDoS2.shtml
CERT Coordination Center, Center Advisory CA-1999-17 Denial of Service tools. http://www.cert.org/advisories/CA-1999-17.html
Adams, C., Gilchrist, J.: The CAST-256 encryption algorithm, RFC 2612, June 1999. http://www.cis.ohio-state.edu/htbin/rfc/rfc2612.html
Dittrich, D., Weaver, G., Dietrich, S., Long, N.: The mstream Distributed Denial of Service attack tool, May 2000. http://staff.washington.edu/dittrich/misc.mstream.analysis.txt
Moore, D., Voelker, G., Savage, S.: Inferring internet denial of service activity, In: Proceedings of the USENIX Security Symposium, Washington, DC, USA, pp. 9–22 (2001)
Yan, Q., Yu, F.R., Gong, Q., Li, J.: Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. In: IEEE Communications Surveys and Tutorials, vol. 18, issue number 1, pp. 602–622, First quarter 2016. https://doi.org/10.1109/COMST.2015.2487361
Salman, O., Elhajj, I. H., Kayssi, A., Chehab, A.: SDN controllers: a comparative study. In: 2016 18th Mediterranean Electrotechnical Conference (MELECON) (2016).https://doi.org/10.1109/melcon.2016.7495430
Tootoonchian, A., Gorbunov, S., Ganjali, Y., Casado, M., Sherwood, R.: On controller performance in software-defined networks. In: USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), vol. 54 92012)
Khondoker, R., Zaalouk, A., Marx, R., Bayarou, K.: Featurebased comparison and selection of Software Defined Networking (SDN) controllers. In: 2014 World Congress on Computer Applications and Information Systems (WCCAIS), pp. 1–7 (2014)
Shalimov, A., Zuikov, D., Zimarina, D., Pashkov, V., Smeliansky, R.: Advanced study of SDN/OpenFlow controllers. In: Proceedings of the 9th Central and Eastern European Software Engineering Conference in Russia, p. 1. ACM (2013)
Kalkan, K., Gur, G., Alagoz, F.: Defense mechanisms against DDoS attacks in SDN environment. IEEE Commun. Mag. 55(9), 175–179 (2017)
Santos, R., Souza, D., Santo, W., Ribeiro, A., Moreno, E.: Machine learning algorithms to detect DDoS attacks in SDN. Concurr. Comput. Pract. Experience 32(2019). https://doi.org/10.1002/cpe.5402
Banitalebi Dehkordi, A., Soltanaghaei, M., Boroujeni, F.Z.: The DDoS attacks detection through machine learning and statistical methods in SDN. J. Supercomput. 1–33 (2020). https://doi.org/10.1007/s11227-020-03323-w
Amazon says it mitigated the largest DDoS attack ever recorded - The Verge. https://www.theverge.com/2020/6/18/21295337/amazon-aws-biggest-DDoS-attack-ever-2-3-tbps-shield-github-netscout-arbor. Accessed 8 Feb 2022
Amazon ‘thwarts largest ever DDoS cyber-attack’ - BBC News. https://www.bbc.com/news/technology-53093611. Accessed 8 Feb 2022
DDOS attacks and the GitHub case» IRIS-BH. https://irisbh.com.br/en/DDoS-attacks-and-the-github-case/. Accessed 8 Feb 2022
Cyber Case Study: The Mirai DDoS Attack on Dyn - CoverLink Insurance|Ohio Independent Insurance Agency. https://coverlink.com/case-study/mirai-DDoS-attack-on-dyn/. Accessed 8 Feb 2022
DDoS attack on BBC may have been biggest in history|CSO Online. https://www.csoonline.com/article/3020292/DDoS-attack-on-bbc-may-have-been-biggest-in-history.html. Accessed 8 Feb 2022
Bello, I., et al.: Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives. J. Ambient. Intell. Humaniz. Comput. 12(9), 8699–8717 (2020). https://doi.org/10.1007/s12652-020-02630-7
Reshmi, T.R.: Information security breaches due to ransomware attacks - a systematic literature review. Int. J. Inf. Manage. Data Insights 1(2), 100013 (2021). https://doi.org/10.1016/j.jjimei.2021.100013
Digital Guardian: A history of ransomware attacks: the biggest and worst ransomware attacks of all time (2019). https://digitalguardian.com/blog/history-ransomware-attacks-biggest-and-worst-ransomware-attacks-all-time. Accessed 17 Dec 2019
Agrawal, R., Stokes, J.W., Selvaraj, K., Marinescu, M.: Attention in recurrent neural networks for ransomware detection. In: Paper Presented at the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and signal Processing (ICASSP) (2019)
Alhawi, O.M.K., Baldwin, J., Dehghantanha, A.: Leveraging machine learning techniques for windows ransomware network traffic detection. In: Dehghantanha, A., Conti, M., Dargahi, T. (eds.) Cyber Threat Intelligence. AIS, vol. 70, pp. 93–106. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-73951-9_5
Alrawashdeh, K., Purdy, C.: Ransomware detection using limited precision deep learning structure in FPGA. In: Paper Presented at the NAECON 2018-IEEE National Aerospace and Electronics Conference (2018)
Cusack, G., Michel, O., Keller, E.: Machine learning-based detection of ransomware using SDN, pp 1–6 (2018). https://doi.org/10.1145/3180465.3180467
Open Networking Foundation. https://www.opennetworking.org/sdndefinition. Accessed 12 Nov 2021
Wang, S.-Y.: Comparison of SDN OpenFlow Network Simulator and Emulators. EstiNet vs. Mininet
Lantz, B., Heller, B., Mckeown, N: A Network in a Laptop: Rapid Prototyping for Software-Defined Networks
Open Network Operating System (ONOS) SDN Controller for SDN/NFV Solutions. https://opennetworking.org/onos/. Accessed 12 Nov 2021
Platform Overview - OpenDaylight. https://www.opendaylight.org/about/platform-overview. Accessed 12 Nov 2021
Ryu SDN Framework. https://ryu-sdn.org/. Accessed 12 Nov 2021
Saikia, D., Malik Jaffe, N., White Paper, T.: Whitepaper Openmul An Introduction to OpenMUL SDN Suite (2014). www.openmul.org. Accessed 12 Nov 2021
Introduction to the HPE VAN SDN Controller. https://techhub.hpe.com/eginfolib/networking/docs/sdn/sdnc2_7/5200-0910prog/content/c_sdnc-pg-intro.html. Accessed 12 Nov 2021
Mininet: An Instant Virtual Network on Your Laptop (or Other PC) - Mininet. http://mininet.org/. Accessed 11 Nov 2021
Keti, F., Askar, S.: Emulation of software defined networks using mininet in different simulation environments. In: Proceedings of the 6th International Conference on Intelligent Systems, Modelling and Simulation (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Prasad, S., Prasad, A., Arockiasamy, K., Yuan, X. (2022). Emulation and Analysis of Software-Defined Networks for the Detection of DDoS Attacks. In: Neuhold, E.J., Fernando, X., Lu, J., Piramuthu, S., Chandrabose, A. (eds) Computer, Communication, and Signal Processing. ICCCSP 2022. IFIP Advances in Information and Communication Technology, vol 651. Springer, Cham. https://doi.org/10.1007/978-3-031-11633-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-11633-9_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-11632-2
Online ISBN: 978-3-031-11633-9
eBook Packages: Computer ScienceComputer Science (R0)